Architectural Design of a Deployment Platform to Provision Mixed-tenancy SaaS-Applications

Size: px
Start display at page:

Download "Architectural Design of a Deployment Platform to Provision Mixed-tenancy SaaS-Applications"

Transcription

1 Architectural Design of a Deployment Platform to Provision Mixed-tenancy SaaS-Applications Matthias Reinhardt, Stefan T. Ruehl 2, Stephan A. W. Verclas 3, Urs Andelfinger and Alois Schütte University of Applied Sciences Darmstadt, Haardtring 00, Darmstadt, Germany 2 Clausthal University of Technology, Albrecht-von-Groddeck-Str. 7, Clausthal-Zellerfeld, Germany 3 T-Systems International GmbH, Heinrich-Hertz-Str., Darmstadt, Germany matthias.reinhardt@stud.h-da.de, {urs.andelfinger, alois.schuette}@h-da.de, stefan.t.ruehl@tu-clausthal.de, stephan.verclas@t-systems.com Keywords: Abstract: Software Architecture, Software Design, Web and Internet Services. Software-as-a-Service (SaaS) is a delivery model whose basic idea is to provide applications to the customer on demand over the Internet. In contrast to similar but older approaches, SaaS promotes multi-tenancy as a tool to exploit economies of scale. This means that a single application instance serves multiple customers. However, a major throwback of SaaS is the customers hesitation of sharing infrastructure, application code, or data with other tenants. This is due to the fact that one of the major threats of multi-tenancy is information disclosure due to a system malfunction, system error, or aggressive actions by individual users. So far the only approach in research to counteract on this hesitation has been to enhance the isolation between tenants using the same instance. Our approach (presented in earlier work) tackles this hesitation differently. It allows customers to choose if or even with whom they want to share the application. The approach enables the customer to make that choice not just for the entire application but specifically for individual application components and the underlying infrastructure. This paper contributes to the mixed-tenancy approach by introducing a software pattern that allows to establish communication between Application Components that are deployed following the mixed-tenancy paradigm. The contributions of this paper are evaluated based on a representative example that employs all possible kinds of communication. INTRODUCTION Software-as-a-Service (SaaS) is a delivery model whose basic idea is to provide applications to the customer on demand over the Internet. SaaS promotes multi-tenancy (MT) as a tool to exploit economies of scale. This means that a single application instance serves multiple customers. However, even though multiple customers use the same instance, each of them has the impression that the instance is designated only to themselves. This is achieved by isolating the tenants data from each other (Chong and Carraro, 2006). In contrast to single-tenancy, MT has the advantage that IT-Infrastructure may be used most efficiently as it is possible to host as many tenants as possible on the same instance. Thus, operational and maintenance cost of the application is decreased. However, one of the major threats of MT applications is information disclosure due to data breach (Bezemer and Zaidman, 200; Cloud Security Alliance, 203). This may occur through a system error, malfunction, or destructive action. So far this problem has only been tackled by proposing new approaches to implement and improve the tenant isolation on a single instance. The approach presented in (Ruehl et al., 202; Ruehl et al., 203), however, is different as it strives to solve the problem by finding a hybrid solution between multi-tenancy and single-tenancy. We refer to this approach as mixed-tenancy. The approach tries to emphasize both the customers concerns about sharing infrastructure as well as the operator s desire to utilize infrastructure as efficiently as possible. The approach that is supposed to answer these questions starts by building an MT application based on the concept of Service-oriented Architecture (SOA). This means the so-called composite SaaSapplications are composed of a number of application components (AC) that each offer atomic functionality. The approach enables the customer to choose if or even with whom they want to share a specific AC 395

2 Architectural Idea for the Variability Problem CLOSER204-4thInternationalConferenceonCloudComputingandServicesScience Application Components Execution Engine 2 3 Dispatcher Tenants <<uses>> Figure : Architectural overview. and the underlying infrastructure stack. This way customers may declare their requirements toward a deployment of Toward their a Method application for realization of customizable variant. multi-tenancy Applications As an example please refer to Figure. It illustrates a setting in which six tenants are using an application that is composed of three ACs. Example requirements that would be possible are:. AC is not handling any critical data, thus all tenants feel comfortable to share instances and the underlying Virtual Machines. 2. AC 2, however, handles semi-sensitive data. Thus, tenant 2, for example, only wants to share an instance with European companies but not with competitors. However, on a Virtual Machine (VM) level, tenant 2 agrees to share with all customers that are not competitors. 3. AC 3 is handling very sensitive data. Thus, tenants will require quite restrictive deployments. Tenant 4, for example, stated that they do not wish to share an instance with competitors and only with companies from the USA. 4. Tenant 6 is special in the sense that they demand a single instance for their private use of every AC and VM. In (Ruehl et al., 203) a semantic model is presented that allows customers to describe their constraints towards a mixed-tenancy deployment. Based on this model the Deployment Configuration Generator (DCG) may be used to capture customer constraints. Furthermore, once the constraints were added into the DCG, a deployment is calculated that applies to all expressed customer constraints and is optimal according to resource consumption. This deployment is described in a transfer document that we refer to as deployment configuration (DC). This will be discussed in detail by Section 3. Based on the DC, a given multi-tenancy enabled composite application may be deployed according to the mixed-tenancy paradigm. This paper s contribution is a software pattern that may be applied to establish communication between ACs deployed in a mixed-tenancy environment. The pattern shall be able to solve the special challenges that appear in such an environment. First of all, this pattern shall be able to enforce the customer given constraints for the data communication between components. And secondly, the pattern promotes the possibility to migrate existing multi-tenancy applications into a mixed-tenancy environment without having to change the application. In order to do that the paper is structured as follows. After a discussion of related work, the paper will start with an analysis of requirements that architecture of the mixed-tenancy platform has to meet. The paper continues by developing the pattern to establish communication. This is done by first discussing existing patterns with respect to the defined 2 requirements, and combine those to satisfy the requirements. In order to be capable of evaluating the communication pattern, it is necessary to develop a mechanism that can automatically deploy an application according to a DC. This is presented by Section 5. Section 6 will conduct an evaluation of the presented pattern by analyzing specifically built scenarios that represent a wide variety of possible cases. The paper concludes with summarizing the results and drawing a conclusion. 2 RELATED WORK SaaS in general as well as the configuration issues and challenges related to it were explored in (Sun et al., 2008). The aspect of functional variability has been discussed in some work. As, for example, in (Mietzner et al., 2009) the author discusses bringing such flexibility to the process layer of process-based, service-oriented SaaS-applications. This is done by creating variability descriptors that are transformed into a BPEL process model. In (Lizhen et al., 200) an approach is presented to describe variability for SaaS-applications. This approach can systematically describe variability points and their relationships, and it assures the quality of the configuration inputs made by the customers. This work focuses on the creation of descriptions of functional variability. Furthermore, there are approaches with the goal to realize MT that meets privacy and performance requirements. In (Guo et al., 2007), for example, a framework for multi-tenant aware SaaS-applications including data isolation, performance isolation or configuration is described. Our approach, in contrast, allows the customer to give input for how and with whom their ACs are deployed. Data security is achieved as tenants do not share the same AC instances. To the best of our knowledge there is no similar approach. In addition, approaches that realize tenants isolation on an MT instance may be applied. 396

3 ArchitecturalDesignofaDeploymentPlatformtoProvisionMixed-tenancySaaS-Applications 3 REQUIREMENTS ANALYSIS This section s purpose is to discuss the necessary requirements towards realizing a mixed-tenancy platform. The platform consists of two major tasks. The first is the automatic deployment, whose job is to deploy the application according to the description of the DC. A prototypical implementation of the deployment task will be discussed in section 5. This may require that multiple VMs need to be created and ACs, that make up the application, will be instantiated multiple times. The DC is the output of the aforementioned DCG and describes the deployment that is to be realized. Thus, the DC defines how many instances of a specific component shall be instantiated on a particular server and which tenants are allowed to access them. It captures a deployment that applies to all constraints of all tenants using the application. Additionally, the DC was created to be optimal according to resource consumptions in order to satisfy the service providers need for efficient use of infrastructure. Figure 2 illustrates the structure of the DC in Entity-Relationship Notation. The figure captures the relationship between the important entities (Servers, ACs, s, Tenants and Users). These entities have been included in an XML-schema, from which a valid DC can be created by defining an XML-file which refers to the schema. This allows us to decouple the DCG from the rest of the platform. The second important task of the platform is the communication. This task of the platform is in charge of establishing communication between the deployed component instances. Since it is our aim to keep the adaptation progress of an application at a minimum, one requirement of the communication task is the separation of the application logic and the platform logic. This may be realized by introducing a new layer above the original application logic. This platform logic layer manages the communication. Furthermore, it is important, that the platform s communication applies to the customers wishes. If a tenant denies the common deployment with another tenant, the platform has to make sure that this can happen under no circumstances. Hence, it has to be avoided, that the data communication of two tenants, who may are competitors, is redirected through a common point of intersection. This is the second requirement that needs to be fulfilled by the communication pattern. It is based on the respect for the customers wishes. If a customer denies to share a component with his competitor, it is not legitimate to redirect both their data traffic through a global interstation. Another reason is a possible high amount of data traffic which could slow down the running application. Server ip cpu n 2 n id ram id 3 AC n name pass id Tenant User : offers / is deployed on 2: belongs to / uses 3: is instance of / is instantiated by 4: employs / belongs to Figure 2: Structure of Deployment Configuration (ERM). 4 PATTERN SELECTION The main goal of this paper is to develop a proper design pattern that allows to establish communication by realizing the prerequisites, that were introduced in the last chapter. To achieve this, we investigate wellestablished design patterns as well as intuitive approaches. We chose a simple example of a DC which contains a special case. In the following, the example will be applied to every pattern. This allows to illustrate how the platform would behave in common situations as well as in the special case. Additionally, it will be possible to compare the individual results in order to select the most appropriate pattern. The comparison is shown in Figure 3 via visualizations of the structure and the sequence (UML sequence diagrams). The example consists of two tenants who are using an application with three components. There are five application component instances () where their border color indicates the tenant belonging. The regular case is demonstrated at component and 3 where both tenants use exclusively one instance. As to component 2 there is only one instance which is shared between tenant and 2. As discussed in the last section it is important that the platform maintains decentralized communication and separation of the platform logic in both cases. Another element which exists in all diagrams is the Execution Engine (EE). It belongs to the platform and has the knowledge of all component-instance locations and tenant belongings. It may fulfill additional tasks depending on the specific patterns it is used in. The first pattern we came up with we called delegator. Within this pattern the EE s job is to delegate communication. When a user or a component instance wants to use a service of another component it asks the delegator which instance of that component belongs to the current tenant. This control communication is represented by the dashed arrows in Figure 3. The EE responds with the whereabouts in form of 4 n 397

4 CLOSER204-4thInternationalConferenceonCloudComputingandServicesScience Delegator Mediator (global) Mediator (per Tenant) Adapter EE EE getinstance(ac2) address EE EE ac_ Mediator Adapter Adapter 2 Adapter 3 2. EE 2. EE Adapter 4 Adapter 5 Mediator Adapter Mediator. 3. Adapter ac3_ ac3_ Figure 3: Overview of different Patterns to tackle the Communication Challenge. an address. Thereby a contact can be established between the two instances or the user and the instance. This direct communication is represented by the solid lines. Changes of the locations are no issue, because the contact to the EE will happen before every function call of another component instance. With respect to the requirements, there is a problem with the separation of the platform logic. The single instance of component 2 knows multiple instances of a component because it is shared by multiple tenants. Thus, we need platform logic in the component, which is not desired because it complicates the adaptation process of an application to the platform. However, the pattern meets the requirement for decentralized communication that applies to customers constraints. Secondly, we engaged in with the mediator pattern provided by Gamma et al. (Gamma et al., 994). The Mediator is an object which encapsulates the interaction between an amount of objects. Thus, the objects are able to communicate without directly connecting to each other. Through our investigation two ways to implement the pattern into the platform emerged global and concrete mediator. The global mediator is characterized by a single mediator object which is represented by the EE. There are solid lines in Figure 3 between the component instances and the mediator. This means that all data communication between the component instances passes through the global mediator, unlike the delegator pattern where the data communication happens directly between the component instances. With the use of the global mediator, there is no communication logic inside the components. They just have to be able to communicate with the EE. Thus, there is no problem with the special case of component 2, where one instance is used by two tenants at once. But because of the passing of the complete data communication through the EE, we detected a problem with the other requirement. If the customer requested the separation to another customer, it is not legitimate to redirect both their data communication through a common point of intersection, which, unfortunately, is the case here. Another negative aspect is a possible overload of the global mediator in a larger scenario, which could slow down the system as the global mediator becomes a bottleneck for all communication. Another way to adapt the mediator pattern is shown by Figure 3 by the use of multiple mediator objects, one mediator per tenant. In contrast to the global mediator the data communication which passes a mediator is related to the same tenant. Because of this, we have successfully respected the requirement of decentralized communication. In case of component 2 there exists only one instance used by both tenants. The instance has to decide which mediator to contact if it wants to call a function of another component. Clearly, there is communication logic necessary inside the components which stands in conflict with the second requirement. Another pattern we ported onto the platform is the adapter pattern which was also given by Gamma et al. (Gamma et al., 994). Usually, it will be applied to establish communication despite incompatible interfaces. For example, when third-party components should be included into a software without the possibility to adjust the interfaces, an adapter is an appropriate solution. In figure 3 there exists an adapter between every two component instances that will eventually need to communicate. Such adapters encapsulate the functionality of their related component instances. In this setup we follow the requirement of de- 398

5 ArchitecturalDesignofaDeploymentPlatformtoProvisionMixed-tenancySaaS-Applications centralized communication. The data communication passing an adapter is related to the same tenant. With respect to the second requirement we have noticed a violation in the case of component 2. A common used component instance must decide which adapter to address. This decision has to be made depending on the current accessing tenant. Thus, communication logic is necessary inside the components. So far none of the investigated patterns have matched both previously defined requirements. On this account we created a new pattern resulting the positive aspects of the previous patterns. It is called because of its behavior. It has no relation to other homonymous design patterns which can be found in literature (e.g. Acceptor and (Schmidt, 995)). Figure 4 describes the structure of the pattern. For every component instance there exists a related connector element. The component instances are solely able to initiate a connection to their connector. This is geared to the global adapter pattern, where there also was no platform logic located in the component instances. In contrast to the global mediator, this approach is distributing the platform intelligence into multiple connector elements and not into a single object like a mediator. Besides, there is a direct communication between the connector-elements. This works just like in the delegator pattern EE 3.2 requesting the address or the reference of the corresponding connector of the target component instance - not of the component-instance. After the actual function call took place, the result will be returned to the initial calling component instance. As illustrated by Figure 5, a connector encapsulates the needed functions of all other components for the related component instance and the provided functions to be called by the other component instances. return ac3_ return return EE getinstance(a) return return address Figure 5: Sequence diagram of the connector pattern. The pattern fits the requirements. As already explained in the last section, we have achieved a decentralized communication and the separation of platform logic. Because of this, we elect the connector pattern to the best way for solving the discussed problem. A summary of the investigated patterns and their ratings is shown in Table. Table : Overview of the results of pattern analysis. Pattern Decentralized Communication Separation of Platform Logic Delegator Mediator (global) Mediator (per tenant) Adapter Figure 4: Example of the connector pattern. In Figure 5 it is demonstrated how the communication works. If a component instance respectively a user wants to retrieve data from another component, it is calling the specific function at the related connector. Thus, here is no platform logic necessary. The component instance treats the function just like a local one. The connector is now handling the establishment of the connection. The EE acts just like the delegator element. The only difference is that the connector is 5 PROTOTYPE REALIZATION Since we were able to identify a mixed-tenancy architecture, there is the need to prove its functionality and practicability. The intent of this section is the description of a case-study which has been realized using the connector pattern. This provides a base for an evaluation of the architecture in the next section. This 399

6 CLOSER204-4thInternationalConferenceonCloudComputingandServicesScience section addresses the requirements of the deployment task which have been defined in Section 3. The main focus of the project relied on how to automatically deploy multiple instances of different components, which afterwards shall communicate with each other. In Figure 6 you can see the automatic deployment of an exemplary mixed-tenancy application. There is a basic VM that is in charge of the deployment. At first the deployment of multiple target VMs starts, which is followed by the deployment of application component instances () and the related connector elements. The locations and number of deployments executed by the EE are given. They result from the customers requirements. VM VM VM 2 m m.n.n Execution Engine m n VM n Figure 6: Deployment of application components. The idea was to develop a mixed-tenancy platform. This means, that it is possible to attach existing multi-tenancy applications to the platform in order to make it mixed-tenancy capable. Thus, we realized the deployment task essentially using VMware vsphere technolog and GlassFish 2 application servers. We used the VMware Virtual Infrastructure Java API (VI java) 3, which is an open source project initiated by VMware. The advantages against the official VMware vsphere Management SDK are its higher performance and easier handling (Jin, 203). The ACs are encapsulated in web archives (WARfiles) and located at the same VM as the EE. During the execution process of a DC, these WAR-files will be duplicated and modified before they will automatically be uploaded and deployed on the target VM. To deploy an we used the GlassFish asadmin tool. To allow or deny the access to an we set the deployment descriptor of the WAR-file according to the information of the submitted DC. The modification of each concrete is necessary, because the deployment constructor consists of many entries that cannot be identical if two s should be deployed on the same server. This way each is unique and can be identified. The restricted access of AC instances gains security benefits over a pure multi-tenancy deployment. This is due to the fact that access restrictions to different instances of the same AC increases tenants isolation. The communication between the connector elements is realized via REST interfaces. To transmit the necessary number of VMs and s we have defined a specific XML schema. A document following this schema contains a number of servers and instances of each component of the application. Furthermore, for each instance it is declared which tenants are allowed to access it. The implementation of SSL encryption would be a further step towards increasing tenants isolation. This will be tackled in future. 6 EVALUATION Based on the realized prototype of a platform introduced in the previous section, it is now possible to evaluate the planned mixed-tenancy architecture. Obviously, the platform is not runnable on its own, as it is supposed to deploy and run a multi-tenancy application. Because of this, we need to develop a dummy multi-tenancy application and port it onto the platform. We made sure, that the application comprises all possible special cases as well as the regular cases. This means that it is built op of multiple components that interact with each other directly or indirectly. An indirect interaction occurs whenever a component instance or a tenant advises a second component instance to call a function of a third component instance. When it comes to the properties of mixedtenancy, we need to test a row of things. In order to test the functionality of the developed platform, we made sure that all possible forms of customer constraints will be deployed without malfunctions. At first we have to distinguish between the server and the component layer. At both layers there exist multiple isolation levels. At first we describe the levels at the component layer. Shared means that there is only one instance of the component, which is used by multiple tenants simultaneously. Separate on the contrary represents single instances of the component owned by each tenant. At last there is a level called mixed which comprises all remaining cases. At this level, there is at least one component instance that is used by more than one but not all existing tenants. Regarding the server level, this is quite similar. Shared means that all tenants share one server where all component instances are deployed. At the separate 400

7 ArchitecturalDesignofaDeploymentPlatformtoProvisionMixed-tenancySaaS-Applications level each tenant needs a single server where all his component instances are deployed. Mixed means that at least two tenants are using component instances on the same server. After the identification and the classification of all realistic cases, we combined the server and component layer. Since each of the layers has three levels, it is resulting in 9 permutations. Three of the 9 permutations are not realistic, e.g. if two tenants share one component instance, they cannot possess their own servers. This finally leads to 6 possibilities. All test cases that belong to the same of the 6 resulting classes are equivalent. This means that we just need to test one to prove its functionality. For example, if we can successfully deploy a shared instance of component A on a server, then this result represents the operativeness of the shared deployment of component B. Thus, we elected one test case for each of the 6 classes. For each one we have tested direct and indirect access of the deployed component instances and verified the effect was as anticipated. Due to the fact that all our test cases run through with success, we can say that our realized mixedtenancy architecture which is embodied by the connector pattern is a working solution for the discussed problem. The evaluation has proven that our defined prerequisites were successfully enforced for the dummy application. However, there are throwbacks coming from the utilized pattern. First of all performance will be decreased. This is due to the communication behavior, where ACs do not communicate directly with each other anymore. Instead communication is handled by connectors. This causes overhead. Secondly, if an operator decides to host a multi-tenancy application following the mixed-tenancy approach, it is necessary to create the connectors for all application components involved. The effort necessary to do that could only be minimized if it would be possible to automatically generate connectors through code inspection. 7 SUMMARY AND CONCLUSION In the first chapter we introduced this paper with the characteristics of multi-tenancy as well as the advantages and disadvantages of cloud providers and their tenants. We explained why there is a demand for a better solution when it comes to the client s privacy needs and the resulting consequences for the provider. For example, when a client does not want to share a part of an application with his competitor, the provider needs to deploy the whole application twice, which leads to higher costs. After that we introduced the concepts of mixedtenancy as a possible solution. In order to verify these concepts as a solution we developed a prototypical platform which is capable of deploying multi-tenancy applications in the form of mixed-tenancy. The main goal of this paper was to identify or design an architecture for this platform. After defining several requirements, we investigated common design patterns regarding their applicability. This leads to the connector pattern which is a combination of the previously analyzed patterns. Since it matched the requirements, we selected the connector pattern as mixed-tenancy architecture. Due to an evaluation of the realized platform, we were able to make sure that it is possible to port simple multi-tenancy applications onto the platform. During the porting process it was obvious that the connector pattern separates the platform logic from the application logic as well as it decentralizes the data communication. Furthermore, we successfully verified that none of the tenants can access a component instance that does not belong to him. Through carefully selected test cases, we made sure that all kinds of DCs were covered. However, these results come with a price. The pattern decreases the performance of an application since it produces an overhead in the communication among ACs. Furthermore, it is required that for every AC a connector is created. That creates an additional effort for an operator that wants to deploy a multi-tenancy application following the mixed-tenancy paradigm. The main goal in the future should be the realization of a stable mixed-tenancy deployment platform. It shall be able to migrate an existing real-world multi-tenancy application onto this platform. For this paper we only evaluated an example application that realizes certain styles of communication. Due to its logical partition in a few components, it turned out to be a good test application and it was possible to gain indications that mixed-tenancy may be realized. However, in order to gain further conclusions and the applicability of the mixed-tenancy approach in realworld scenarios, it will be necessary to evaluate the migration of a real application. Although, the focus of this paper was not based on performance, we aspire to optimize it in future research. Thus, a detailed performance analysis is still open for future research. So far the only security measures that have been implemented are basic authentication and user impersonation. The mixed-tenancy concept allows to deploy further security measures to isolate tenants even further (e.g. on a network level). However, this has not been investigated further yet, 40

8 CLOSER204-4thInternationalConferenceonCloudComputingandServicesScience as it was our goal to create a working platform with initial security. Finally, one additional point that is still open for future research is the platform s lifecycle. In a realworld environment it is highly desired to have a environment that is both scalable and elastically adaptive. As a first step these characteristics were not addressed by this paper but bear great opportunities for future research. REFERENCES 6th International Conference on Cloud Computing (CLOUD), pages Schmidt, D. C. (995). Acceptor and connector: A family of object creational patterns for initializing communication services. In In Proceedings of the European Pattern Language of Programs conference, pages 0 4. Sun, W., Zhang, X., Guo, C. J., Sun, P., and Su, H. (2008). Software as a service: Configuration and customization perspectives. In Services Part II, IEEE Congress on, volume 0, pages 8 25, Los Alamitos, CA, USA. IEEE Computer Society. Bezemer, C.-P. and Zaidman, A. (200). Multi-tenant SaaS applications: maintenance dream or nightmare? In Proceedings of the Joint ERCIM Workshop on Software Evolution (EVOL) and International Workshop on Principles of Software Evolution (IWPSE), IWPSE-EVOL 0, page 88 92, New York, NY, USA. ACM. Chong, F. and Carraro, G. (2006). Architecture strategies for catching the long tail. Microsoft MSDN. Cloud Security Alliance (203). The notorious nine: Cloud computing top threats in 203. Technical report. Gamma, E., Helm, R., and Johnson, R. E. (994). Design Patterns. Elements of Reusable Object-Oriented Software. Addison-Wesley Longman, Amsterdam, st ed., reprint. edition. Guo, C. J., Sun, W., Huang, Y., Wang, Z. H., and Gao, B. (2007). A framework for native multi-tenancy application development and management. In The 9th IEEE International Conference on E-Commerce Technology and The 4th IEEE International Conference on Enterprise Computing, E-Commerce and E-Services (CEC-EEE 2007), pages , Tokyo, Japan. Jin, S. (203). VMware infrastructure (vsphere) java API. Lizhen, C., Haiyang, W., Lin, J., and Pu, H. (200). Customization modeling based on metagraph for multitenant applications. In 5th International Conference on Pervasive Computing and Applications, pages , Maribor, Slovenia. Mietzner, R., Metzger, A., Leymann, F., and Pohl, K. (2009). Variability modeling to support customization and deployment of multi-tenant-aware software as a service applications. In Workshop on Principles of Engineering Service Oriented Systems, ICSE, volume 0, pages 8 25, Los Alamitos, CA, USA. IEEE Computer Society. Ruehl, S. T., Andelfinger, U., Rausch, A., and Verclas, S. A. (202). Toward realization of deployment variability for software-as-a-service applications. In 202 IEEE 5th International Conference on Cloud Computing (CLOUD), pages Ruehl, S. T., Wache, H., and Verclas, S. A. W. (203). Capturing customers requirements towards mixed-tenancy deployments of SaaS-Applications. In 203 IEEE 402

VARIABILITY MODELING FOR CUSTOMIZABLE SAAS APPLICATIONS

VARIABILITY MODELING FOR CUSTOMIZABLE SAAS APPLICATIONS VARIABILITY MODELING FOR CUSTOMIZABLE SAAS APPLICATIONS ABSTRACT Ashraf A. Shahin 1, 2 1 College of Computer and Information Sciences, Al Imam Mohammad Ibn Saud Islamic University (IMSIU) Riyadh, Kingdom

More information

A Design of the Conceptual Architecture for a Multitenant SaaS Application Platform

A Design of the Conceptual Architecture for a Multitenant SaaS Application Platform A Design of the Conceptual Architecture for a Multitenant SaaS Application Platform Sungjoo Kang 1, Sungwon Kang 2, Sungjin Hur 1 Software Service Research Team, Electronics and Telecommunications Research

More information

Theoretical and Pragmatic Cases of a Rich-Variant Approach for a User-Aware Multi-Tenant SaaS Applications

Theoretical and Pragmatic Cases of a Rich-Variant Approach for a User-Aware Multi-Tenant SaaS Applications ComputerandInformation Science; Vol. 12, No.1; 2019 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Science and Education Theoretical and Pragmatic Cases of a Rich-Variant Approach for

More information

Idioms for Building Software Frameworks in AspectJ

Idioms for Building Software Frameworks in AspectJ Idioms for Building Software Frameworks in AspectJ Stefan Hanenberg 1 and Arno Schmidmeier 2 1 Institute for Computer Science University of Essen, 45117 Essen, Germany shanenbe@cs.uni-essen.de 2 AspectSoft,

More information

Object-Oriented Design

Object-Oriented Design Object-Oriented Design Lecturer: Raman Ramsin Lecture 20: GoF Design Patterns Creational 1 Software Patterns Software Patterns support reuse of software architecture and design. Patterns capture the static

More information

Multitenant Software as a Service: Application Development Approach

Multitenant Software as a Service: Application Development Approach Multitenant Software as a Service: Application Development Approach Suhas Gajakosh 1, Mukta Takalikar 2 Abstract Software as a Service (SaaS) is bringing new revolution to IT industry. SaaS has changed

More information

A Multi-Tenant Framework for Multimedia Conference System

A Multi-Tenant Framework for Multimedia Conference System 2013 8th International Conference on Communications and Networking in China (CHINACOM) A Multi-Tenant Framework for Multimedia Conference System Wang Shaofeng,Shang Yanlei,Tian Yue The State Key Lab of

More information

A NOVEL MULTI-TENANT ARCHITECTURE DESIGN FOR SOFTWARE AS A SERVICE APPLICATIONS

A NOVEL MULTI-TENANT ARCHITECTURE DESIGN FOR SOFTWARE AS A SERVICE APPLICATIONS A NOVEL MULTI-TENANT ARCHITECTURE DESIGN FOR SOFTWARE AS A SERVICE APPLICATIONS Haitham Yaish, Madhu Goyal and George Feuerlicht 1,2 1 Faculty of Engineering and Information Technology, University of Technology,

More information

Abstract. Keywords. 1. Introduction. Suhas Gajakosh 1,Mukta Takalikar 2

Abstract. Keywords. 1. Introduction. Suhas Gajakosh 1,Mukta Takalikar 2 Multitenant Software as a Service: Application Development Approach Suhas Gajakosh 1,Mukta Takalikar 2 Abstract Software as a Service (SaaS) is bringing new revolution to IT industry. SaaS has changed

More information

A Rich-Variant Architecture for a User-Aware multi-tenant SaaS approach

A Rich-Variant Architecture for a User-Aware multi-tenant SaaS approach www.ijcsi.org https://doi.org/10.5281/zenodo.1346047 46 A Rich-Variant Architecture for a User-Aware multi-tenant SaaS approach 1 Houda Kriouile 1 and Bouchra El Asri 2 IMS Team, ADMIR Lab, ENSIAS, Rabat

More information

1.1 Jadex - Engineering Goal-Oriented Agents

1.1 Jadex - Engineering Goal-Oriented Agents 1.1 Jadex - Engineering Goal-Oriented Agents In previous sections of the book agents have been considered as software artifacts that differ from objects mainly in their capability to autonomously execute

More information

White Paper BC/DR in the Cloud Era

White Paper BC/DR in the Cloud Era BC/DR in the Cloud Era Today, enterprises of all sizes are virtualizing their mission-critical applications, either within their own data center, or with an external cloud vendor. One key driver is to

More information

ANALYSIS OF SaaS MULTI-TENANT DATABASE IN A CLOUD ENVIRONMENT

ANALYSIS OF SaaS MULTI-TENANT DATABASE IN A CLOUD ENVIRONMENT ANALYSIS OF SaaS MULTI-TENANT DATABASE IN A CLOUD ENVIRONMENT Maram Hassan AlAlwan Alalwan.maram@gmail.com Soha S. Zaghloul smekki@ksu.edu.sa College of Computer and Information Science Department of Computer

More information

Implementing a Storage Pattern in the OR Mapping Framework

Implementing a Storage Pattern in the OR Mapping Framework , pp.29-38 http://dx.doi.org/10.14257/ijgdc.2013.6.5.03 Implementing a Storage Pattern in the OR Mapping Framework Muhammad Naeem Ahmed Khan, Arsalan Shahid and Sarah Shafqat Shaheed Zulfikar Ali Bhutto

More information

Chapter 4. Fundamental Concepts and Models

Chapter 4. Fundamental Concepts and Models Chapter 4. Fundamental Concepts and Models 4.1 Roles and Boundaries 4.2 Cloud Characteristics 4.3 Cloud Delivery Models 4.4 Cloud Deployment Models The upcoming sections cover introductory topic areas

More information

Why Consider Implementation-Level Decisions in Software Architectures?

Why Consider Implementation-Level Decisions in Software Architectures? 1. Abstract Why Consider Implementation-Level Decisions in Software Architectures? Nikunj Mehta Nenad Medvidović Marija Rakić {mehta, neno, marija}@sunset.usc.edu Department of Computer Science University

More information

Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms

Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms EXECUTIVE SUMMARY Intel Cloud Builder Guide Intel Xeon Processor-based Servers Novell* Cloud Manager Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms Novell* Cloud Manager Intel

More information

Hadoop Virtualization Extensions on VMware vsphere 5 T E C H N I C A L W H I T E P A P E R

Hadoop Virtualization Extensions on VMware vsphere 5 T E C H N I C A L W H I T E P A P E R Hadoop Virtualization Extensions on VMware vsphere 5 T E C H N I C A L W H I T E P A P E R Table of Contents Introduction... 3 Topology Awareness in Hadoop... 3 Virtual Hadoop... 4 HVE Solution... 5 Architecture...

More information

Dynamic Adaptability of Services in Enterprise JavaBeans Architecture

Dynamic Adaptability of Services in Enterprise JavaBeans Architecture 1. Introduction Dynamic Adaptability of Services in Enterprise JavaBeans Architecture Zahi Jarir *, Pierre-Charles David **, Thomas Ledoux ** zahijarir@ucam.ac.ma, {pcdavid, ledoux}@emn.fr (*) Faculté

More information

Flex Tenancy :48:27 UTC Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement

Flex Tenancy :48:27 UTC Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Flex Tenancy 2015-04-28 17:48:27 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Flex Tenancy... 3 Flex Tenancy... 4 Understanding the Flex Tenancy

More information

Pattern-Oriented Development with Rational Rose

Pattern-Oriented Development with Rational Rose Pattern-Oriented Development with Rational Rose Professor Peter Forbrig, Department of Computer Science, University of Rostock, Germany; Dr. Ralf Laemmel, Department of Information Management and Software

More information

Build application-centric data centers to meet modern business user needs

Build application-centric data centers to meet modern business user needs Build application-centric data centers to meet modern business user needs Citrix.com Table of contents Meeting current business challenges...3 Device package integration...5 Policy-based service insertion...6

More information

X-S Framework Leveraging XML on Servlet Technology

X-S Framework Leveraging XML on Servlet Technology X-S Framework Leveraging XML on Servlet Technology Rajesh Kumar R Abstract This paper talks about a XML based web application framework that is based on Java Servlet Technology. This framework leverages

More information

VMware vcloud Architecture Toolkit Hybrid VMware vcloud Use Case

VMware vcloud Architecture Toolkit Hybrid VMware vcloud Use Case VMware vcloud Architecture Toolkit Version 2.0.1 October 2011 This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents

More information

An Approach to Software Component Specification

An Approach to Software Component Specification Page 1 of 5 An Approach to Software Component Specification Jun Han Peninsula School of Computing and Information Technology Monash University, Melbourne, Australia Abstract. Current models for software

More information

Service Function Chaining. Intended status: Informational Expires: January 1, 2015 Peng He Ciena July 1, 2014

Service Function Chaining. Intended status: Informational Expires: January 1, 2015 Peng He Ciena July 1, 2014 Service Function Chaining Internet Draft Intended status: Informational Expires: January 1, 2015 C. Huang Carleton University Jiafeng Zhu Huawei Peng He Ciena July 1, 2014 SFC Use Cases on Recursive Service

More information

MODELLING COMPOSITIONS OF MODULAR EMBEDDED SOFTWARE PRODUCT LINES

MODELLING COMPOSITIONS OF MODULAR EMBEDDED SOFTWARE PRODUCT LINES MODELLING COMPOSITIONS OF MODULAR EMBEDDED SOFTWARE PRODUCT LINES Wolfgang Friess AUDI AG wolfgang.friess@audi.de Julio Sincero University Erlangen-Nuernberg sincero@informatik.uni-erlangen.de Wolfgang

More information

Appendix A - Glossary(of OO software term s)

Appendix A - Glossary(of OO software term s) Appendix A - Glossary(of OO software term s) Abstract Class A class that does not supply an implementation for its entire interface, and so consequently, cannot be instantiated. ActiveX Microsoft s component

More information

Cisco Application Policy Infrastructure Controller Data Center Policy Model

Cisco Application Policy Infrastructure Controller Data Center Policy Model White Paper Cisco Application Policy Infrastructure Controller Data Center Policy Model This paper examines the Cisco Application Centric Infrastructure (ACI) approach to modeling business applications

More information

XBS Application Development Platform

XBS Application Development Platform Introduction to XBS Application Development Platform By: Liu, Xiao Kang (Ken) Xiaokang Liu Page 1/10 Oct 2011 Overview The XBS is an application development platform. It provides both application development

More information

Semantic SOA - Realization of the Adaptive Services Grid

Semantic SOA - Realization of the Adaptive Services Grid Semantic SOA - Realization of the Adaptive Services Grid results of the final year bachelor project Outline review of midterm results engineering methodology service development build-up of ASG software

More information

DESIGN PATTERN - INTERVIEW QUESTIONS

DESIGN PATTERN - INTERVIEW QUESTIONS DESIGN PATTERN - INTERVIEW QUESTIONS http://www.tutorialspoint.com/design_pattern/design_pattern_interview_questions.htm Copyright tutorialspoint.com Dear readers, these Design Pattern Interview Questions

More information

OpenNebula on VMware: Cloud Reference Architecture

OpenNebula on VMware: Cloud Reference Architecture OpenNebula on VMware: Cloud Reference Architecture Version 1.2, October 2016 Abstract The OpenNebula Cloud Reference Architecture is a blueprint to guide IT architects, consultants, administrators and

More information

Style-specific techniques to design product-line architectures

Style-specific techniques to design product-line architectures Style-specific techniques to design product-line architectures Philippe Lalanda Thomson-CSF Corporate Research Laboratory Phone: 33 1 69 33 92 90 Email: lalanda@thomson-lcr.fr Domaine de Corbeville 91404

More information

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: STRETCHING BEYOND STATIC SECURITY 2 SECTION 2: NEW DEFENSES FOR CLOUD ENVIRONMENTS 5 SECTION

More information

The SD-WAN security guide

The SD-WAN security guide The SD-WAN security guide How a flexible, software-defined WAN can help protect your network, people and data SD-WAN security: Separating fact from fiction For many companies, the benefits of SD-WAN are

More information

Developing Software Applications Using Middleware Infrastructure: Role Based and Coordination Component Framework Approach

Developing Software Applications Using Middleware Infrastructure: Role Based and Coordination Component Framework Approach Developing Software Applications Using Middleware Infrastructure: Role Based and Coordination Component Framework Approach Ninat Wanapan and Somnuk Keretho Department of Computer Engineering, Kasetsart

More information

ThinAir Server Platform White Paper June 2000

ThinAir Server Platform White Paper June 2000 ThinAir Server Platform White Paper June 2000 ThinAirApps, Inc. 1999, 2000. All Rights Reserved Copyright Copyright 1999, 2000 ThinAirApps, Inc. all rights reserved. Neither this publication nor any part

More information

Overview SENTINET 3.1

Overview SENTINET 3.1 Overview SENTINET 3.1 Overview 1 Contents Introduction... 2 Customer Benefits... 3 Development and Test... 3 Production and Operations... 4 Architecture... 5 Technology Stack... 7 Features Summary... 7

More information

Towards Reusable Heterogeneous Data-Centric Disentangled Parts

Towards Reusable Heterogeneous Data-Centric Disentangled Parts Towards Reusable Heterogeneous Data-Centric Disentangled Parts Michael Reinsch and Takuo Watanabe Department of Computer Science, Graduate School of Information Science and Technology, Tokyo Institute

More information

Cloud Computing Concepts, Models, and Terminology

Cloud Computing Concepts, Models, and Terminology Cloud Computing Concepts, Models, and Terminology Chapter 1 Cloud Computing Advantages and Disadvantages https://www.youtube.com/watch?v=ojdnoyiqeju Topics Cloud Service Models Cloud Delivery Models and

More information

Cloud Computing and Service-Oriented Architectures

Cloud Computing and Service-Oriented Architectures Material and some slide content from: - Atif Kahn SERVICES COMPONENTS OBJECTS MODULES Cloud Computing and Service-Oriented Architectures Reid Holmes Lecture 20 - Tuesday November 23 2010. SOA Service-oriented

More information

Enabling Efficient and Scalable Zero-Trust Security

Enabling Efficient and Scalable Zero-Trust Security WHITE PAPER Enabling Efficient and Scalable Zero-Trust Security FOR CLOUD DATA CENTERS WITH AGILIO SMARTNICS THE NEED FOR ZERO-TRUST SECURITY The rapid evolution of cloud-based data centers to support

More information

Infrastructure as a Service (IaaS) Compute with Storage and Backup PRICING DOCUMENT

Infrastructure as a Service (IaaS) Compute with Storage and Backup PRICING DOCUMENT Infrastructure as a Service (IaaS) Compute with Storage and Backup PRICING DOCUMENT Contents 1 Cloud+ IaaS Pricing...2 1.1 Service Pricing Guide... Error! Bookmark not defined. 1.2 Cloud+ Networking Pricing...

More information

HP SDN Document Portfolio Introduction

HP SDN Document Portfolio Introduction HP SDN Document Portfolio Introduction Technical Solution Guide Version: 1 September 2013 Table of Contents HP SDN Document Portfolio Overview... 2 Introduction... 2 Terms and Concepts... 2 Resources,

More information

Towards the integration of security patterns in UML Component-based Applications

Towards the integration of security patterns in UML Component-based Applications Towards the integration of security patterns in UML Component-based Applications Anas Motii 1, Brahim Hamid 2, Agnès Lanusse 1, Jean-Michel Bruel 2 1 CEA, LIST, Laboratory of Model Driven Engineering for

More information

Introduction and Overview

Introduction and Overview IBM z/os Connect Enterprise Edition V2.0 API API API API API CICS Clients in the API Economy IMS DB2 Other Introduction and Overview 1 2015, IBM Corporation Topics to be Discussed Links to Pages Setting

More information

Introduction. Delivering Management as Agile as the Cloud: Enabling New Architectures with CA Technologies Virtual Network Assurance Solution

Introduction. Delivering Management as Agile as the Cloud: Enabling New Architectures with CA Technologies Virtual Network Assurance Solution Delivering Management as Agile as the Cloud: Enabling New Architectures with CA Technologies Virtual Network Assurance Solution Introduction Service providers and IT departments of every type are seeking

More information

2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising

More information

ACI Terminology. This chapter contains the following sections: ACI Terminology, on page 1. Cisco ACI Term. (Approximation)

ACI Terminology. This chapter contains the following sections: ACI Terminology, on page 1. Cisco ACI Term. (Approximation) This chapter contains the following sections:, on page 1 Alias API Inspector App Center Alias A changeable name for a given object. While the name of an object, once created, cannot be changed, the Alias

More information

Cloud Computing and Service-Oriented Architectures

Cloud Computing and Service-Oriented Architectures Material and some slide content from: - Atif Kahn SERVICES COMPONENTS OBJECTS MODULES Cloud Computing and Service-Oriented Architectures Reid Holmes Lecture 29 - Friday March 22 2013. Cloud precursors

More information

Using Design Patterns in Education and Tutoring for the Software Systems Projects in Economic

Using Design Patterns in Education and Tutoring for the Software Systems Projects in Economic Using Design Patterns in Education and Tutoring for the Software Systems Projects in Economic Cornelia NOVAC-UDUDEC cornelia.novac@ugal.ro Dunarea de Jos University of Galati Abstract. The paper deals

More information

The Authenticator Pattern

The Authenticator Pattern The Authenticator Pattern F. Lee Brown, Jr. James DiVietri Graziella Diaz de Villegas CyberGuard Corp. Fort Lauderdale, FL 33309 Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic

More information

Decentralization of BPEL Using Various Processes.

Decentralization of BPEL Using Various Processes. Decentralization of BPEL Using Various Processes. A.V.A Sushama Sarvani M.Tech Student, Department of CSE Vignan'sNirula Institute of Technology and Science for Women, Pedapalakaluru, Guntur-522 005 ABSTRACT:

More information

Container Services for High Confidence Software

Container Services for High Confidence Software Container Services for High Confidence Software Gary J. Vecellio, William M. Thomas, and Robert M. Sanders The MITRE Corporation 7515 Colshire Drive McLean, VA 22102-7508 {vecellio,bthomas,rsanders}@mitre.org

More information

Applying Experiences with Declarative Codifications of Software Architectures on COD

Applying Experiences with Declarative Codifications of Software Architectures on COD Applying Experiences with Declarative Codifications of Software Architectures on COD Position Paper Roel Wuyts Stéphane Ducasse Gabriela Arévalo roel.wuyts@iam.unibe.ch ducasse@iam.unibe.ch arevalo@iam.unibe.ch

More information

Coordination Patterns

Coordination Patterns Coordination Patterns 1. Coordination Patterns Design Patterns and their relevance for Coordination Oscar Nierstrasz Software Composition Group Institut für Informatik (IAM) Universität Bern oscar@iam.unibe.ch

More information

Keywords: Abstract Factory, Singleton, Factory Method, Prototype, Builder, Composite, Flyweight, Decorator.

Keywords: Abstract Factory, Singleton, Factory Method, Prototype, Builder, Composite, Flyweight, Decorator. Comparative Study In Utilization Of Creational And Structural Design Patterns In Solving Design Problems K.Wseem Abrar M.Tech., Student, Dept. of CSE, Amina Institute of Technology, Shamirpet, Hyderabad

More information

UNIT 5 - UML STATE DIAGRAMS AND MODELING

UNIT 5 - UML STATE DIAGRAMS AND MODELING UNIT 5 - UML STATE DIAGRAMS AND MODELING UML state diagrams and modeling - Operation contracts- Mapping design to code UML deployment and component diagrams UML state diagrams: State diagrams are used

More information

Configuration Provider: A Pattern for Configuring Threaded Applications

Configuration Provider: A Pattern for Configuring Threaded Applications Configuration Provider: A Pattern for Configuring Threaded Applications Klaus Meffert 1 and Ilka Philippow 2 Technical University Ilmenau plop@klaus-meffert.de 1, ilka.philippow@tu-ilmena.de 2 Abstract

More information

Work groups meeting 3

Work groups meeting 3 Work groups meeting 3 INF5040 (Open Distributed Systems) Sabita Maharjan sabita@simula.no Department of Informatics University of Oslo September 07, 2009 Design Patterns J2EE Design Patterns Outline EIS

More information

Cloud Computing An IT Paradigm Changer

Cloud Computing An IT Paradigm Changer Cloud Computing An IT Paradigm Changer Mazin Yousif, PhD CTO, Cloud Computing IBM Canada Ltd. Mazin Yousif, PhD T-Systems International 2009 IBM Corporation IT infrastructure reached breaking point App

More information

SDC Design patterns GoF

SDC Design patterns GoF SDC Design patterns GoF Design Patterns The design pattern concept can be viewed as an abstraction of imitating useful parts of other software products. The design pattern is a description of communicating

More information

Construction and Application of Cloud Data Center in University

Construction and Application of Cloud Data Center in University International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2014) Construction and Application of Cloud Data Center in University Hong Chai Institute of Railway Technology,

More information

CLOUD COMPUTING. Lecture 4: Introductory lecture for cloud computing. By: Latifa ALrashed. Networks and Communication Department

CLOUD COMPUTING. Lecture 4: Introductory lecture for cloud computing. By: Latifa ALrashed. Networks and Communication Department 1 CLOUD COMPUTING Networks and Communication Department Lecture 4: Introductory lecture for cloud computing By: Latifa ALrashed Outline 2 Introduction to the cloud comupting Define the concept of cloud

More information

Virtual Security Gateway Overview

Virtual Security Gateway Overview This chapter contains the following sections: Information About the Cisco Virtual Security Gateway, page 1 Cisco Virtual Security Gateway Configuration for the Network, page 10 Feature History for Overview,

More information

CA ERwin Data Modeler s Role in the Relational Cloud. Nuccio Piscopo.

CA ERwin Data Modeler s Role in the Relational Cloud. Nuccio Piscopo. CA ERwin Data Modeler s Role in the Relational Cloud Nuccio Piscopo Table of Contents Abstract.....3 Introduction........3 Daas requirements through CA ERwin Data Modeler..3 CA ERwin in the Relational

More information

Cisco Application Centric Infrastructure and Microsoft SCVMM and Azure Pack

Cisco Application Centric Infrastructure and Microsoft SCVMM and Azure Pack White Paper Cisco Application Centric Infrastructure and Microsoft SCVMM and Azure Pack Introduction Cisco Application Centric Infrastructure (ACI) is a next-generation data center fabric infrastructure

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

WHITE PAPER. RedHat OpenShift Container Platform. Benefits: Abstract. 1.1 Introduction

WHITE PAPER. RedHat OpenShift Container Platform. Benefits: Abstract. 1.1 Introduction WHITE PAPER RedHat OpenShift Container Platform Abstract Benefits: Applications are designed around smaller independent components called microservices. Elastic resources: Scale up or down quickly and

More information

Cisco ACI Terminology ACI Terminology 2

Cisco ACI Terminology ACI Terminology 2 inology ACI Terminology 2 Revised: May 24, 2018, ACI Terminology Cisco ACI Term Alias API Inspector App Center Application Policy Infrastructure Controller (APIC) Application Profile Atomic Counters Alias

More information

Trust4All: a Trustworthy Middleware Platform for Component Software

Trust4All: a Trustworthy Middleware Platform for Component Software Proceedings of the 7th WSEAS International Conference on Applied Informatics and Communications, Athens, Greece, August 24-26, 2007 124 Trust4All: a Trustworthy Middleware Platform for Component Software

More information

Access Control in Rich Domain Model Web Applications

Access Control in Rich Domain Model Web Applications Access Control in Rich Domain Model Web Applications Extended Abstract João de Albuquerque Penha Pereira joao.pereira@ist.utl.pt Instituto Superior Técnico November 25, 2010 Abstract Rich Domain Model

More information

Multi Packed Security Addressing Challenges in Cloud Computing

Multi Packed Security Addressing Challenges in Cloud Computing Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Towards High Level SaaS Maturity Model: Methods and Case Study

Towards High Level SaaS Maturity Model: Methods and Case Study Towards High Level SaaS Maturity Model: Methods and Case Study Yong Zhang, Shijun Liu, Xiangxu Meng School of Computer Science and Technology, Shan Dong University, Jinan 250101, P.R.China evelyn0330@163.com,

More information

A Metric of the Relative Abstraction Level of Software Patterns

A Metric of the Relative Abstraction Level of Software Patterns A Metric of the Relative Abstraction Level of Software Patterns Atsuto Kubo 1, Hironori Washizaki 2, and Yoshiaki Fukazawa 1 1 Department of Computer Science, Waseda University, 3-4-1 Okubo, Shinjuku-ku,

More information

8. CONCLUSION AND FUTURE WORK. To address the formulated research issues, this thesis has achieved each of the objectives delineated in Chapter 1.

8. CONCLUSION AND FUTURE WORK. To address the formulated research issues, this thesis has achieved each of the objectives delineated in Chapter 1. 134 8. CONCLUSION AND FUTURE WORK 8.1 CONCLUSION Virtualization and internet availability has increased virtualized server cluster or cloud computing environment deployments. With technological advances,

More information

Pulse Secure Application Delivery

Pulse Secure Application Delivery DATA SHEET Pulse Secure Application Delivery HIGHLIGHTS Provides an Application Delivery and Load Balancing solution purposebuilt for high-performance Network Functions Virtualization (NFV) Uniquely customizable,

More information

Partner Center: Secure application model

Partner Center: Secure application model Partner Center: Secure application model The information provided in this document is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including

More information

Cisco CloudCenter Solution with Cisco ACI: Common Use Cases

Cisco CloudCenter Solution with Cisco ACI: Common Use Cases Cisco CloudCenter Solution with Cisco ACI: Common Use Cases Cisco ACI increases network security, automates communication policies based on business-relevant application requirements, and decreases developer

More information

Cloud Service SLA Declaration

Cloud Service SLA Declaration Cloud Service SLA Declaration Basic level of support for Cloud services (SLA 1) Table of Content: 1. Definitions 2. General terms 3. Level of service warranty service functioning 4. Provider`s liability

More information

Automatic Code Generation for Non-Functional Aspects in the CORBALC Component Model

Automatic Code Generation for Non-Functional Aspects in the CORBALC Component Model Automatic Code Generation for Non-Functional Aspects in the CORBALC Component Model Diego Sevilla 1, José M. García 1, Antonio Gómez 2 1 Department of Computer Engineering 2 Department of Information and

More information

<Placeholder cover we will adjust> Microsoft Azure Stack Licensing Guide (Hosters and service providers)

<Placeholder cover we will adjust> Microsoft Azure Stack Licensing Guide (Hosters and service providers) Microsoft Azure Stack Licensing Guide (Hosters and service providers) Introduction This licensing guide is for people who would like to gain a basic understanding of

More information

A Lightweight Language for Software Product Lines Architecture Description

A Lightweight Language for Software Product Lines Architecture Description A Lightweight Language for Software Product Lines Architecture Description Eduardo Silva, Ana Luisa Medeiros, Everton Cavalcante, Thais Batista DIMAp Department of Informatics and Applied Mathematics UFRN

More information

Sentinet for Windows Azure VERSION 2.2

Sentinet for Windows Azure VERSION 2.2 Sentinet for Windows Azure VERSION 2.2 Sentinet for Windows Azure 1 Contents Introduction... 2 Customer Benefits... 2 Deployment Topologies... 3 Isolated Deployment Model... 3 Collocated Deployment Model...

More information

Channel FAQ: Smartcrypt Appliances

Channel FAQ: Smartcrypt Appliances Channel FAQ: Smartcrypt Appliances Q: When were Smartcrypt appliances announced? A: announced the release of our Smartcrypt virtual and physical appliances on September 19, 2017. Smartcrypt Enterprise

More information

How Cisco IT Improves Commerce User Experience by Securely Sharing Internal Business Services with Partners

How Cisco IT Improves Commerce User Experience by Securely Sharing Internal Business Services with Partners How Cisco IT Improves Commerce User Experience by Securely Sharing Internal Business Services with Partners Offloading XML processing to the ACE XML Gateway improves service performance and simplifies

More information

PRODUCT DESCRIPTIONS AND METRICS

PRODUCT DESCRIPTIONS AND METRICS PRODUCT DESCRIPTIONS AND METRICS Adobe PDM - Adobe LiveCycle Managed Services (2013v3) The Services described in this PDM are Managed Services and are governed by the terms of the General Terms, the Exhibit

More information

Component-Based Platform for a Virtual University Information System

Component-Based Platform for a Virtual University Information System Component-Based Platform for a Virtual University Information System Dr. IVAN GANCHEV, Dr. MAIRTIN O DROMA, FERGAL McDONNELL Department of Electronics and Computer Engineering University of Limerick National

More information

Cloud Revenue Streams

Cloud Revenue Streams Cloud Revenue Streams Not All Cloud Platforms Are Created Equal Prepared for: White Paper 2012 Neovise, LLC. All Rights Reserved. Introduction Cloud computing is creating new ways for businesses to outsource

More information

Azure Pack is one of Microsoft s most underrated tools.

Azure Pack is one of Microsoft s most underrated tools. content provided by sponsored by Making the Most of Azure Pack This free tool can bring an Azure-like environment to a private cloud. Find out what Azure Pack is and why it s useful. BY BRIEN M. POSEY

More information

WE ARE COMMITTED TO PROTECTING YOUR PERSONAL DATA

WE ARE COMMITTED TO PROTECTING YOUR PERSONAL DATA WE ARE COMMITTED TO PROTECTING YOUR PERSONAL DATA In accordance with the new Regulation (EU) 2016/679 on the protection of personal data (GDPR), we ask you to give your consent on the use of Cookies, for

More information

An Approach to Evaluate and Enhance the Retrieval of Web Services Based on Semantic Information

An Approach to Evaluate and Enhance the Retrieval of Web Services Based on Semantic Information An Approach to Evaluate and Enhance the Retrieval of Web Services Based on Semantic Information Stefan Schulte Multimedia Communications Lab (KOM) Technische Universität Darmstadt, Germany schulte@kom.tu-darmstadt.de

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

Storage Considerations for VMware vcloud Director. VMware vcloud Director Version 1.0

Storage Considerations for VMware vcloud Director. VMware vcloud Director Version 1.0 Storage Considerations for VMware vcloud Director Version 1.0 T e c h n i c a l W H I T E P A P E R Introduction VMware vcloud Director is a new solution that addresses the challenge of rapidly provisioning

More information

VMWARE SERVICE PROVIDER PROGRAM PRODUCT USAGE GUIDE Q2

VMWARE SERVICE PROVIDER PROGRAM PRODUCT USAGE GUIDE Q2 VSPP Product Usage Guide VMware Service Providers Program (VSPP) VSPP Product Usage Guide VMWARE SERVICE PROVIDER PROGRAM PRODUCT USAGE GUIDE Q2 2011 VMware, Inc. 3401 Hillview Avenue Palo Alto CA 94304

More information

Federal Agencies and the Transition to IPv6

Federal Agencies and the Transition to IPv6 Federal Agencies and the Transition to IPv6 Introduction Because of the federal mandate to transition from IPv4 to IPv6, IT departments must include IPv6 as a core element of their current and future IT

More information

Technical Overview. Version March 2018 Author: Vittorio Bertola

Technical Overview. Version March 2018 Author: Vittorio Bertola Technical Overview Version 1.2.3 26 March 2018 Author: Vittorio Bertola vittorio.bertola@open-xchange.com This document is copyrighted by its authors and is released under a CC-BY-ND-3.0 license, which

More information

Software Engineering - I An Introduction to Software Construction Techniques for Industrial Strength Software

Software Engineering - I An Introduction to Software Construction Techniques for Industrial Strength Software Software Engineering - I An Introduction to Software Construction Techniques for Industrial Strength Software Chapter 9 Introduction to Design Patterns Copy Rights Virtual University of Pakistan 1 Design

More information

SIMS TERMS AND CONDITIONS OF USE AGREEMENT

SIMS TERMS AND CONDITIONS OF USE AGREEMENT SIMS TERMS AND CONDITIONS OF USE AGREEMENT 1. These Terms and Conditions ("the Terms and Conditions") govern your ("the User") use of the Website and Web application and the information thereon, known

More information